Security in smart home environment: issues, challenges, and countermeasures - a survey

被引:1
作者
Saad R.M.A. [1 ,2 ]
Al Soufy K.A.M. [1 ]
Shaheen S.I. [2 ]
机构
[1] Department of Electrical Engineering, Faculty of Engineering, Ibb University, Ibb
[2] Department of Computer Engineering, Faculty of Engineering, Cairo University, Giza
关键词
internet of things; IoT; malware; security attacks; smart home;
D O I
10.1504/IJSN.2023.129887
中图分类号
学科分类号
摘要
The accelerated spread of the IoT and rapid development of modern communication networks and technologies have connected the physical world with computational elements in the smart home environment. The smart home is based on IoT technology which facilitates device observing in order to increase the availability of various tools for securing home automation. Thus, it has been used as a feature of the future wireless sensor network to be able to operate without human intervention. However, it is vulnerable to vulnerabilities and security threats. Due to interconnected, heterogeneous, and dynamic nature of the smart home, challenges related to security, authentication, and confidentiality are created. In this paper attacks on the security of smart homes are investigated to assess their impact on the security of the system as a whole. The technologies and security solutions in such environment are also identified. Therefore, current security measures are discussed to counter such security attacks. Copyright © 2023 Inderscience Enterprises Ltd.
引用
收藏
页码:1 / 9
页数:8
相关论文
共 52 条
[1]  
Ahlawat B., Sangwan A., Sindhu V., IoT system model, challenges and threats, Int. J. Sci. Technol. Res, 9, 3, pp. 6771-6776, (2020)
[2]  
Alioto M., Enabling the Internet of Things: From Integrated Circuits to Integrated Systems, (2017)
[3]  
Aliyu F., Sheltami T., Shakshuki E.M., A detection and prevention technique for man in the middle attack in fog computing, Procedia Computer Science, 141, pp. 24-31, (2018)
[4]  
Alrawais A., Alhothaily A., Hu C., Cheng X., Fog computing for the internet of things: security and privacy issues, IEEE Internet Computing, 21, 2, pp. 34-42, (2017)
[5]  
Al-Sarawi S., Anbar M., Alieyan K., Alzubaidi M., Internet of things (IoT) communication protocols, the 2017 8th International Conference on Information Technology (ICIT), (2017)
[6]  
Al-Shaboti M., Welch I., Chen A., Mahmood M.A., Towards secure smart home IoT: manufacturer and user network access control framework, the 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), (2018)
[7]  
Ande R., Adebisi B., Hammoudeh M., Saleem J., Internet of things: evolution and technologies from a security perspective, Sustainable Cities and Society, 54, (2020)
[8]  
Aris A., Oktug S.F., Yalcin S.B.O., Internet-of-things security: denial of service attacks, the 2015 23rd Signal Processing and Communications Applications Conference (SIU), (2015)
[9]  
Ashibani Y., Mahmoud Q.H., Design and evaluation of a user authentication model for IoT networks based on app event patterns, Cluster Computing, 24, 2, pp. 837-850, (2021)
[10]  
Babar S., Stango A., Prasad N., Sen J., Prasad R., Proposed embedded security framework for internet of things (IoT), the 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), (2011)